Pedrhom
Nafisi
ENC
1102
Dr.
Taylor
Annotated
Bibliography
Encryption is Innocent and Should Not Plead Guilty
for Terrorism
Goodnight, Eric Z. "What is Encryption, and Why
Are People Afraid of It?" 30 November 2015. Web. 14 February 2016.
This source written by Eric Z
Goodnight was one of the most well rounded sources I found as it has a variety
of information pertaining to what encryption actually is and why encryption is
suddenly a relevant topic in regards to terrorism and politics. It explains
initially that encryption works by taking data and scrambling it into
gibberish. From there, to decrypt it back into data you use a method called
ciphering which involves the usage of a key that shows what the original data
was encrypted into character by character. This information concisely
summarizes encryption and holds relevancy to explain encryption in very brief
detail before expressing my topic and stance. Another important piece of
information from this article is its details on ISIL. Explaining how ISIL uses popular
mobile messaging applications such as WhatsApp, which encrypts all data sent,
creates the bridge between terrorism and encryption. Goodnight furthermore
describes how the government has approached immense electronic companies such
as Apple and Google, asking them to create a secret backdoor decryption method.
The problem with this is explained concisely by Apple CEO Tim Cook in which he
says “You can’t have a backdoor that’s only for the good guys.” This heavily
supports my argument that acting against encryption will not do anything as
trying to break holes in our security will only allow enemies to exploit that
hole.
Brandom,
Russell. "The Five Big Lies of the Encryption Debate." The Verge. Vox
Media, 12 Jan. 2016. Web. 17 Feb. 2016
Brandom Russell in this source makes
a list of five concrete points that supports the idea that banning encryption
will not help prevent terrorism or any other related actions, all of which
supports my argument. His first point is that the government is saying that
criminals have “gone dark” or in other words are able to communicate behind the
court’s back. The problem with this is that terrorism is no harder to track
than it was fifteen years ago as trying to track down a private file or get
access to a phone call transcript is just as difficult and unethical as asking
for encrypted data to be decrypted. Just because the information is secure in
another fashion does not make it more acceptable for the government to want
access to our data and this fact supports the idea that the court should not
even be trying to go after encrypted data in the first place. Russell’s second
point is that the government is already trying to talk with tech companies in
order for them to get the information they want. The government words their
side of the argument in a way to give the false idea that their access to
information is either all or nothing; however, it is a fact that in this
digital age access to information has been at its peak and the right court
order can allow police to go through a person’s Gmail or iCloud account. Power
is something the government already has a lot of in regards to our personal
information and so banning encryption will not change anything for the good of
the common man. The last three points he makes all point to the same idea that
the government banning encryption will favor the government more on the topic
of having the power to see anyone’s chat logs rather than prevent terrorism. Russell
fully lays down the facts and uses it to promote an idea that banning
encryption will not prevent terrorism like the government says it will and this
supports my argument completely while keeping relevancy.
Brown,
Aaron. "WhatsApp BAN: Cameron's EU Referendum will Decide Fate of
Encrypted Messaging App." Sunday Express. 15 July 2015. Web. 14 February
2016.
The United Kingdom’s Prime Minister
David Cameron has created a proposal that will ban encrypted messaging
applications from being used. Brown explains that Cameron is taking this action
as encrypted messaging apps create “a guaranteed safe space for terrorists,
criminals and pedophiles to operate beyond the reach of law.” This is extremely
relevant to my topic as there is much evidence from my other sources that
encryption does not make data any more inaccessible than it was a decade ago. I
can use this information to create an argument that this guaranteed safe spot
is no safer than chatting over the phone ten years ago as it is just as illegal
to listen in on phone conversations as it is to track conversations through
text messages. Brown also explains how this encryption ban ties in to a
previous issue called the Snoopers’ Charter which is a proposed bill that would
allow the United Kingdom to force internet service providers to track all data
from their consumer’s activities. This includes everything from internet
browsing activity, email, phone messaging services, and all other activities
that require an internet connection. What Brown shows with this is that the
United Kingdom has created plans in the past to track the common man’s
information before. This information can be used to help bring up the argument
that the United Kingdom’s government has tried to gain the ability to access
all data before, and with the current trend of how they have created bill after
bill with the same goal in mind shows that even if the proposed ban on
encryption fails to pass, there will be a new issue that will once again cause
the government to try to track all data once again.
Zou,
Cliff. "Research On The Encryption Debate." E-mail interview. 15 Mar.
2016.
Cliff Zou is a UCF staff member in the Department of
Computer Science with a Master’s Degree in Digital Forensics and a Ph.D. in
Electrical & Computer Engineering. I got in touch and interviewed him via
e-mail and asked him three simple questions in regards to the encryption debate
in order to get the opinion of a local expert. My first question was “Do you
think encryption should be what the government is targeting in regards to
reducing terrorist activity?” Zou responded by saying that targeting terrorism
is only one subject area that the government can focus on by going after
encryption. He also says that many criminal cases will be affected by this as
the current encryption debate revolving around Apple and the FBI is due to a
criminal case, not one regarding terrorism. This information helps broaden my
scope of what banning encryption potentially effects. After that, my second
question was “Should the government try to make companies create a backdoor in
their security software so that the government can access information that
could be potentially dangerous? What would creating a backdoor possibly cause
in regards to the common man's privacy?” Zou answers that the government should
definitely not force companies to create backdoors in their software. He
further explains that a backdoor that is created for the government can be
found and exploited by hackers to commit cyber-attacks. This would cause not
only for Apple’s products to be less safe, but less sales for them since
consumers will move to a different device in which its security against
cyber-attacks is more superior. This information is useful in regards to
providing more negative consequences that weakening encryption creates as Apple
will suffer as a company. Lastly, I asked “David Cameron, British Prime
Minister, has created a proposal that will ban online messaging applications
such as iMessage and Snapchat that uses encryption to protect the user's
privacy. Will this help prevent issues in regards to terrorism or will it
create more problems than it stops?” To which Zou replied that even if the ban
goes through, technology is constantly advancing and new ways of security to
hide from the eyes of the government can be created. An example he creates is
the use of end-to-end encryption through the use of a Virtual Private Network
(VPN) which does not rely on the encryption methods of iMessage or any other
application based encryption. This information is very important in helping me
create the idea that the ban is futile in the first place since people will
find ways to work around it.
Isaac,
Mike. "Explaining Apple’s Fight with the F.B.I." The New York Times.
The New York Times, 17 Feb. 2016. Web. 21 Feb. 2016.
Isaac in this article summarizes
what is currently going on between the company Apple and the FBI. A federal
court ordered Apple to assist the FBI in unlocking an iPhone of an attacker who
murdered fourteen people San Bernardino, California in December 2015. The FBI
wants to use brute force in order to gain access to the attacker’s data, but
the iPhone has a security measure in which its data is deleted after ten failed
password attempts. I can use this information in my essay to refer to an actual
court case that is occurring between two big groups. According to Isaac, the
issue with what the FBI is asking is that to bypass the password lock Apple
would have to create a new version of the iPhone’s iOS software with specific
instructions that allows the FBI to get infinite attempts. This new version
along with the software could potentially unlock any iPhone in someone’s
possession and for such a powerful program to exist is potentially dangerous if
gotten into the wrong hands. This is very important because with the FBI having
access to such a program could allow them to possibly break the fourth
amendment without the knowledge of the people. The NSA has done something
similar in the past with them spying on people’s information so it is not hard
to think that the FBI would not do the same. this information to further push
the point that creating a backdoor like this can be used against us and so it
should not exist. The same engineers that created the encryption programs on
the iOS software should not have to create their own countermeasures against
the defenses they made is a quote Isaac used which sums up his opinions on the
debate very well.
Grothaus,
Michael. "Apple vs FBI: Encryption, IPhones & Terrorism." Know
Your Mobile. Dennis Publishing, 10 Mar. 2016. Web. 11 Mar. 2016.
Grothaus begins his article by explaining the
current fight going on between the FBI and Apple over encryption. He adds on
that giant technology companies such as Facebook and Google are fully
supporting Apple. This is important as it shows that other tech companies do
not want to be forced into the creation of a backdoor in their products either.
If the FBI wins the case over Apple, then it is very plausible that the FBI
could go after other companies as well to complete their mission of creating
backdoors in all products in order for them to have access to all consumer
information. Grothaus continues by saying that the FBI could possibly continue
to increase the amount of spying they do if they win the case. He uses a quote
from a news article called The Guardian that says “If the FBI wins in its case
against Apple to help it unlock the San Bernardino killer’s iPhone 5C, it won’t
be long before the government forces Apple to turn on users’ iPhone cameras and
microphones to spy on them.” This is a very scary idea to think about, knowing that
at any moment the government could be looking through your camera at your
personal space. This helps support the idea that the FBI should not gain more
power than it already has because if encryption is meaningless, then the FBI
constantly try to get access to more data. Grothaus uses reasoning to infer how
this case potentially effects the whole world. He makes a very important point
that this backdoor will allow the United States to access all iPhones,
regardless of the phone’s location. This means the United States would be able
to spy on anyone all over the world. This is a huge and crucial point as now
the people that are effected is every person around the world with an iPhone
and other countries would not want that in the slightest. What they would want,
is also access to the backdoor software and the amount of people that have the
potential to spy on your data would exponentially increase and this is a huge
hole in everyone with an iPhone’s security.
Brandom,
Russell. "Why the NSA Is Staying out of Apple's Fight with the FBI."
The Verge. Vox Media, 09 Mar. 2016. Web. 11 Mar. 2016.
Brandom asks and answers an
important question in this article which is why the NSA has remained silent in
regards to the encryption debate between Apple and the FBI. What Brandom says
is that the NSA has actually explained that many of their key officials have
decided to side with Apple. This is both surprising and extremely relevant to
my topic since the NSA is a government agency that would seem to want the
backdoor to exist in iPhones since the NSA has been confirmed to have the
ability to spy on people and their data. The reasoning of this according to
Brandom is due to the differences between how the NSA and FBI investigates
cases and infiltrates technology. The NSA tends to work in a covert fashion and
they try to do all their work in the dark and that is the exact opposite with
this case and the matter in which the FBI is handling this issue. I can
implement this information in my essay to create a point that although the
government wants to get more intelligence, it would be preferable in a matter
that the masses do not know about so it is not made into a big deal like this
case. Brandom then goes on to explaining that not much is known to exactly why
the FBI is trying to force Apple to make such a drastic change to their
encrypted software in order to get access to one phone. There is a commercially
available tool called the IP-BOX that costs $350 and it allows a user to brute
force past an iPhone’s lock screen between six seconds to seventeen hours. This
information shows that it is very possible that the FBI is simply using this
case in order to try and get as much power as they can. This means that the
case is no longer about simply accessing an attacker’s phone but rather a
direct attack on encryption which is both relevant and important to my topic of
encryption being banned.
Greenberg,
Andy. "Proposed State Bans on Phone Encryption Make Zero Sense."
Wired.com. Conde Nast Digital, 27 Jan. 2016. Web. 9 Mar. 2016.
Greenberg begins his article by
explaining that never in history has a single state determined whether we could
have secure encryption on our smartphones or not, but now it is happening. He
describes how a California state legislator has proposed a bill that would ban
the retail sale of any smartphone that features full-disk encryption. This is a
security measure that was made to ensure that no one can decrypt and read your
phone’s contents except the owner. The scary part is that New York has also
proposed a similar bill for its state, and all of this information is useful
since it means that multiple states are trying to pass this ban and if one is
successfully able to do so, other states will also attempt the same thing. The
bill is worded in a way that explains that its intentions is to give law
enforcement the ability to access the phones of criminals and victims when
their phones are seized as evidence. Greenberg also looks at the fact that even
if an encryption ban was deemed a reasonable privacy sacrifice for the sake of
law enforcement, it would at least make sense if it was on a national level but
this bill is on a state level so all it would do is compromise the security of
people’s data in that state alone. This is important information because I can
make the point that this bill would not prevent terrorism and it could not help
any issue that is on a national scale so all it would cause is an increase in
cyber-attacks in that state. This bill is also problematic for all technology
companies as they would have to make special smartphones for those specific
states that fits into the states’ anti-encryption laws. Greenberg makes a very
good point that if a criminal was smart enough to conduct to cyber-attacks,
they would simply just use an iPhone from a state that is not from New York or
California since the law does not matter to them. This is a very good point
that I could use in my essay to support why a state wide ban would be highly
illogical.
Cyril,
Malkia. "Black Americans and Encryption: The Stakes Are Higher than Apple
v FBI." The Guardian. Guardian News and Media, 21 Mar. 2016. Web. 21 Mar.
2016.
Cyril starts the article by making an interesting
comparison between what is going on in the Apple vs FBI case and what happened
with Martin Luther King Jr. Cyril explains that when the FBI labeled Martin
Luther King Jr as a “dangerous” threat to America’s national security, they began
tapping his phones. This was then followed by a long history of spying on black
activists in the United States. What Cyril is getting at is that if the FBI can
call something dangerous in order to justify their actions of spying on people,
then the same could apply to encryption and the attacker’s phone in order to
have the ability to spy on a national scale. This fact is an important detail
that I could use to further push the idea that the Apple v. FBI case is more
than just about getting into an individual’s phone but rather gaining the
access to everyone’s information through a backdoor. Cyril furthermore argues
that this fight between Apple and the FBI also effects the black community.
According to Cyril the Department of Homeland Security has been monitoring the
activities of famous black activists since the Ferguson uprisings, and if the
encryption backdoor passes then the government could simply label the activists
as dangerous and then go after them with ease. This information can be applied
to the fact that the FBI will have the power to shut down the voices of people
they simply do not like. This is a violation of democracy since we cannot have
a healthy democracy without the voice of every individual.
Smith,
Lindsey J. "Donald Trump on Apple Encryption Battle: 'Who Do They Think
They Are?'" The Verge. Vox Media, 17 Feb. 2016. Web. 9 Mar. 2016.
Smith in this article writes about
what republican presidential candidate Donald Trump thinks in regards to the
court case of Apple v. FBI. Donald Trump during an interview on Fox and Friends
said "To think that Apple won't allow us to get into her cellphone? Who do
they think they are?" This shows that he is a supporter of the FBI in the
case and that he thinks the government should be able to bypass any encryption
in order to get the intelligence they need. This is relevant because I can use
this information to show who is for or against the banning of encryption. Trump
adds on that if the backdoor was created to bypass Apple’s encryption, it would
only be used once to "find out what happened [and] why it happened"
and if there are "other people involved." The problem with this is
that one man’s guarantee that it will only be used once is not enough to
justify reducing the security levels of all Americans. Plus, it does not matter
if the government only uses it once, its entire existence is creates the
possibility for the software to fall into the wrong hands and create a
cyber-catastrophe. This information is very relevant because it shows that
encryption becoming banned will become much more likely if Donald Trump was put
into office. Smith furthermore adds that Trump has stated before that he wants
the ability to monitor the internet and to "take back the internet"
from ISIS. Even though the internet technically belongs to everyone, misuse of
it should be prevented however going after encryption is not the correct path.
No comments:
Post a Comment